Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp1660431rwb; Tue, 27 Sep 2022 16:58:20 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5vCCG2vgRDbBfP+vbKOaGvUgZCfV403xFhzLepiGgLM75d1uuRuqKDvT+bOk3DFCwONiBf X-Received: by 2002:a05:6402:26d6:b0:451:24da:f8cf with SMTP id x22-20020a05640226d600b0045124daf8cfmr30843375edd.385.1664323100264; Tue, 27 Sep 2022 16:58:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664323100; cv=none; d=google.com; s=arc-20160816; b=BX/8qGfEIfHnH+JqrNmvZoUW/vrrIrruUsFftcP1IDFKHs0lTHsyW9bEYiItd9jjmd Z3ChwYO3CTks0Q0cEuaZYtfgJmmpZAKuth7YIRFgqErE8eDlkI8VcPqkp0QSFNi6La2F 5tqsGswwr3RLl3HyonTQbyYowM149dMEaaVP4gotnErs+suzO+UbgEtiaanidUXOP1vg SPuWJ7XRUqlCkDFI1JkjYhuaFfHZzTaF7dy9qX9UqmKZVX/XPVuTSWrDzZD1OeorXLI1 5Ky4l/sm0sQqBPDJeaTNy3X4CJC1obq/EAdW1mcBRwJW/mrkmtR08FEhtfdKFzzyg63G IyXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=L3ydGwMwbkMJj2nTpKzTCyMbmToiJeXKfoiUjEjzhrw=; b=Bzfr/QAMr6yX76pYQK75WgqpHhjfSKxf631ajvo47Y1VzXyXP58NDmb6deyTJZScog TeF6FtNdSzXM3sMv3SMwuYzgvYFKb9zthXfNTrKqL2gCXYyBsTSBzatrgfSAGdfXM3xA Js2n8VSe0d0qLViM99LmcKI/GFuWUg8H6bEPff/CbPeXjaBYJlzC6kQGpt7gpp04L+Mx jP3E72v3MUnzPI6UrH81QX6dGGBwoWJ76nrTYzSmgVyqwc1pj4iiUP5D/UWFVslwKTDB 12EYnsMvsFI6fBKlYqwrVJLj7Qlt/cJxUVvnminsMbSE8foGvglc5GWi+TBLYi7JS0Wv O0FA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y20-20020a056402271400b0044811f7cfa6si3749360edd.486.2022.09.27.16.57.49; Tue, 27 Sep 2022 16:58:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232050AbiI0XxW (ORCPT + 99 others); Tue, 27 Sep 2022 19:53:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57318 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232593AbiI0Xw7 (ORCPT ); Tue, 27 Sep 2022 19:52:59 -0400 Received: from mail105.syd.optusnet.com.au (mail105.syd.optusnet.com.au [211.29.132.249]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 80BD21E8006; Tue, 27 Sep 2022 16:51:38 -0700 (PDT) Received: from dread.disaster.area (pa49-181-106-210.pa.nsw.optusnet.com.au [49.181.106.210]) by mail105.syd.optusnet.com.au (Postfix) with ESMTPS id 1692C110108A; Wed, 28 Sep 2022 09:51:30 +1000 (AEST) Received: from dave by dread.disaster.area with local (Exim 4.92.3) (envelope-from ) id 1odKML-00CxJa-Io; Wed, 28 Sep 2022 09:51:29 +1000 Date: Wed, 28 Sep 2022 09:51:29 +1000 From: Dave Chinner To: "Darrick J. Wong" Cc: Shiyang Ruan , linux-kernel@vger.kernel.org, linux-xfs@vger.kernel.org, nvdimm@lists.linux.dev, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, dan.j.williams@intel.com Subject: Re: [RFC PATCH] xfs: drop experimental warning for fsdax Message-ID: <20220927235129.GC3600936@dread.disaster.area> References: <1663234002-17-1-git-send-email-ruansy.fnst@fujitsu.com> <20220919045003.GJ3600936@dread.disaster.area> <20220919211533.GK3600936@dread.disaster.area> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Optus-CM-Score: 0 X-Optus-CM-Analysis: v=2.4 cv=e9dl9Yl/ c=1 sm=1 tr=0 ts=63338c84 a=j6JUzzrSC7wlfFge/rmVbg==:117 a=j6JUzzrSC7wlfFge/rmVbg==:17 a=IkcTkHD0fZMA:10 a=xOM3xZuef0cA:10 a=omOdbC7AAAAA:8 a=7-415B0cAAAA:8 a=VHcvpX4-_hD7FttO6b8A:9 a=QEXdDO2ut3YA:10 a=biEYGPWJfzWAr4FL6Ov7:22 X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 27, 2022 at 09:02:48AM -0700, Darrick J. Wong wrote: > On Tue, Sep 27, 2022 at 02:53:14PM +0800, Shiyang Ruan wrote: > > > > > > 在 2022/9/20 5:15, Dave Chinner 写道: > > > On Mon, Sep 19, 2022 at 02:50:03PM +1000, Dave Chinner wrote: > > > > On Thu, Sep 15, 2022 at 09:26:42AM +0000, Shiyang Ruan wrote: > > > > > Since reflink&fsdax can work together now, the last obstacle has been > > > > > resolved. It's time to remove restrictions and drop this warning. > > > > > > > > > > Signed-off-by: Shiyang Ruan > > > > > > > > I haven't looked at reflink+DAX for some time, and I haven't tested > > > > it for even longer. So I'm currently running a v6.0-rc6 kernel with > > > > "-o dax=always" fstests run with reflink enabled and it's not > > > > looking very promising. > > > > > > > > All of the fsx tests are failing with data corruption, several > > > > reflink/clone tests are failing with -EINVAL (e.g. g/16[45]) and > > > > *lots* of tests are leaving stack traces from WARN() conditions in > > > > DAx operations such as dax_insert_entry(), dax_disassociate_entry(), > > > > dax_writeback_mapping_range(), iomap_iter() (called from > > > > dax_dedupe_file_range_compare()), and so on. > > > > > > > > At thsi point - the tests are still running - I'd guess that there's > > > > going to be at least 50 test failures by the time it completes - > > > > in comparison using "-o dax=never" results in just a single test > > > > failure and a lot more tests actually being run. > > > > > > The end results with dax+reflink were: > > > > > > SECTION -- xfs_dax > > > ========================= > > > > > > Failures: generic/051 generic/068 generic/074 generic/075 > > > generic/083 generic/091 generic/112 generic/127 generic/164 > > > generic/165 generic/175 generic/231 generic/232 generic/247 > > > generic/269 generic/270 generic/327 generic/340 generic/388 > > > generic/390 generic/413 generic/447 generic/461 generic/471 > > > generic/476 generic/517 generic/519 generic/560 generic/561 > > > generic/605 generic/617 generic/619 generic/630 generic/649 > > > generic/650 generic/656 generic/670 generic/672 xfs/011 xfs/013 > > > xfs/017 xfs/068 xfs/073 xfs/104 xfs/127 xfs/137 xfs/141 xfs/158 > > > xfs/168 xfs/179 xfs/243 xfs/297 xfs/305 xfs/328 xfs/440 xfs/442 > > > xfs/517 xfs/535 xfs/538 xfs/551 xfs/552 > > > Failed 61 of 1071 tests > > > > > > Ok, so I did a new no-reflink run as a baseline, because it is a > > > while since I've tested DAX at all: > > > > > > SECTION -- xfs_dax_noreflink > > > ========================= > > > Failures: generic/051 generic/068 generic/074 generic/075 > > > generic/083 generic/112 generic/231 generic/232 generic/269 > > > generic/270 generic/340 generic/388 generic/461 generic/471 > > > generic/476 generic/519 generic/560 generic/561 generic/617 > > > generic/650 generic/656 xfs/011 xfs/013 xfs/017 xfs/073 xfs/297 > > > xfs/305 xfs/517 xfs/538 > > > Failed 29 of 1071 tests > > > > > > Yeah, there's still lots of warnings from dax_insert_entry() and > > > friends like: > > > > > > [43262.025815] WARNING: CPU: 9 PID: 1309428 at fs/dax.c:380 dax_insert_entry+0x2ab/0x320 > > > [43262.028355] Modules linked in: > > > [43262.029386] CPU: 9 PID: 1309428 Comm: fsstress Tainted: G W 6.0.0-rc6-dgc+ #1543 > > > [43262.032168] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 > > > [43262.034840] RIP: 0010:dax_insert_entry+0x2ab/0x320 > > > [43262.036358] Code: 08 48 83 c4 30 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 8b 58 20 48 8d 53 01 e9 65 ff ff ff 48 8b 58 20 48 8d 53 01 e9 50 ff ff ff <0f> 0b e9 70 ff ff ff 31 f6 4c 89 e7 e8 84 b1 5a 00 eb a4 48 81 e6 > > > [43262.042255] RSP: 0018:ffffc9000a0cbb78 EFLAGS: 00010002 > > > [43262.043946] RAX: ffffea0018cd1fc0 RBX: 0000000000000001 RCX: 0000000000000001 > > > [43262.046233] RDX: ffffea0000000000 RSI: 0000000000000221 RDI: ffffea0018cd2000 > > > [43262.048518] RBP: 0000000000000011 R08: 0000000000000000 R09: 0000000000000000 > > > [43262.050762] R10: ffff888241a6d318 R11: 0000000000000001 R12: ffffc9000a0cbc58 > > > [43262.053020] R13: ffff888241a6d318 R14: ffffc9000a0cbe20 R15: 0000000000000000 > > > [43262.055309] FS: 00007f8ce25e2b80(0000) GS:ffff8885fec80000(0000) knlGS:0000000000000000 > > > [43262.057859] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > > [43262.059713] CR2: 00007f8ce25e1000 CR3: 0000000152141001 CR4: 0000000000060ee0 > > > [43262.061993] Call Trace: > > > [43262.062836] > > > [43262.063557] dax_fault_iter+0x243/0x600 > > > [43262.064802] dax_iomap_pte_fault+0x199/0x360 > > > [43262.066197] __xfs_filemap_fault+0x1e3/0x2c0 > > > [43262.067602] __do_fault+0x31/0x1d0 > > > [43262.068719] __handle_mm_fault+0xd6d/0x1650 > > > [43262.070083] ? do_mmap+0x348/0x540 > > > [43262.071200] handle_mm_fault+0x7a/0x1d0 > > > [43262.072449] ? __kvm_handle_async_pf+0x12/0xb0 > > > [43262.073908] exc_page_fault+0x1d9/0x810 > > > [43262.075123] asm_exc_page_fault+0x22/0x30 > > > [43262.076413] RIP: 0033:0x7f8ce268bc23 > > > > > > So it looks to me like DAX is well and truly broken in 6.0-rc6. And, > > > yes, I'm running the fixes in mm-hotifxes-stable branch that allow > > > xfs/550 to pass. > > > > I have tested these two mode for many times: > > > > xfs_dax mode did failed so many cases. (If you tested with this "drop" > > patch, some warning around "dax_dedupe_file_range_compare()" won't occur any > > more.) I think warning around "dax_disassociate_entry()" is a problem with > > concurrency. Still looking into it. > > > > But xfs_dax_noreflink didn't have so many failure, just 3 in my environment: > > Failures: generic/471 generic/519 xfs/148. I am thinking that did you > > forget to reformat the TEST_DEV to be non-reflink before run the test? If > > so it will make sense. No, I did not forget to turn off reflink for the test device: # ./run_check.sh --mkfs-opts "-m reflink=0,rmapbt=1" --run-opts "-s xfs_dax_noreflink -g auto" umount: /mnt/test: not mounted. umount: /mnt/scratch: not mounted. wrote 8589934592/8589934592 bytes at offset 0 8.000 GiB, 8192 ops; 0:00:03.99 (2.001 GiB/sec and 2049.0850 ops/sec) wrote 8589934592/8589934592 bytes at offset 0 8.000 GiB, 8192 ops; 0:00:04.13 (1.936 GiB/sec and 1982.5453 ops/sec) meta-data=/dev/pmem0 isize=512 agcount=4, agsize=524288 blks = sectsz=4096 attr=2, projid32bit=1 = crc=1 finobt=1, sparse=1, rmapbt=1 = reflink=0 bigtime=1 inobtcount=1 nrext64=0 data = bsize=4096 blocks=2097152, imaxpct=25 = sunit=0 swidth=0 blks naming =version 2 bsize=4096 ascii-ci=0, ftype=1 log =internal log bsize=4096 blocks=16384, version=2 = sectsz=4096 sunit=1 blks, lazy-count=1 realtime =none extsz=4096 blocks=0, rtextents=0 ..... Running: MOUNT_OPTIONS= ./check -R xunit -b -s xfs_dax_noreflink -g auto SECTION -- xfs_dax_noreflink FSTYP -- xfs (debug) PLATFORM -- Linux/x86_64 test3 6.0.0-rc6-dgc+ #1543 SMP PREEMPT_DYNAMIC Mon Sep 19 07:46:37 AEST 2022 MKFS_OPTIONS -- -f -m reflink=0,rmapbt=1 /dev/pmem1 MOUNT_OPTIONS -- -o dax=always -o context=system_u:object_r:root_t:s0 /dev/pmem1 /mnt/scratch So, yeah, reflink was turned off on both test and scratch devices, and dax=always on both the test and scratch devices was used to ensure that DAX was always in use. > FWIW I saw dmesg failures in xfs/517 and xfs/013 starting with 6.0-rc5, > and I haven't even turned on reflink yet: > > run fstests xfs/517 at 2022-09-26 19:53:34 > XFS (pmem1): EXPERIMENTAL Large extent counts feature in use. Use at your own risk! > XFS (pmem1): Mounting V5 Filesystem > XFS (pmem1): Ending clean mount > XFS (pmem1): Quotacheck needed: Please wait. > XFS (pmem1): Quotacheck: Done. > XFS (pmem1): Unmounting Filesystem > XFS (pmem0): EXPERIMENTAL online scrub feature in use. Use at your own risk! > XFS (pmem1): EXPERIMENTAL Large extent counts feature in use. Use at your own risk! > XFS (pmem1): Mounting V5 Filesystem > XFS (pmem1): Ending clean mount > XFS (pmem1): Quotacheck needed: Please wait. > XFS (pmem1): Quotacheck: Done. > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 415317 at fs/dax.c:380 dax_insert_entry+0x22d/0x320 > Modules linked in: xfs nft_chain_nat xt_REDIRECT nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_tcpudp ip_set_hash_ip ip_set_hash_net xt_set nft_compat ip_set_hash_mac ip_set nf_tables libcrc32c bfq nfnetlink pvpanic_mmio pvpanic nd_pmem dax_pmem nd_btt sch_fq_codel fuse configfs ip_tables x_tables overlay nfsv4 af_packet [last unloaded: scsi_d > > CPU: 1 PID: 415317 Comm: fsstress Tainted: G W 6.0.0-rc7-xfsx #rc7 727341edbd0773a36b78b09dab448fa1896eb3a5 > Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014 > RIP: 0010:dax_insert_entry+0x22d/0x320 > Code: e0 48 83 c4 20 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 8b 58 20 48 8d 53 01 e9 62 ff ff ff 48 8b 58 20 48 8d 53 01 e9 4d ff ff ff <0f> 0b e9 6d ff ff ff 31 f6 48 89 ef e8 72 74 12 00 eb a1 83 e0 02 > RSP: 0000:ffffc90004693b28 EFLAGS: 00010002 > RAX: ffffea0010a20480 RBX: 0000000000000001 RCX: 0000000000000001 > RDX: ffffea0000000000 RSI: 0000000000000033 RDI: ffffea0010a204c0 > RBP: ffffc90004693c08 R08: 0000000000000000 R09: 0000000000000000 > R10: ffff88800c226228 R11: 0000000000000001 R12: 0000000000000011 > R13: ffff88800c226228 R14: ffffc90004693e08 R15: 0000000000000000 > FS: 00007f3aad8db740(0000) GS:ffff88803ed00000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: 00007f3aad8d1000 CR3: 0000000043104003 CR4: 00000000001706e0 > Call Trace: > > dax_fault_iter+0x26e/0x670 > dax_iomap_pte_fault+0x1ab/0x3e0 > __xfs_filemap_fault+0x32f/0x5a0 [xfs c617487f99e14abfa5deb24e923415b927df3d4b] > __do_fault+0x30/0x1e0 > do_fault+0x316/0x6d0 > ? mmap_region+0x2a5/0x620 > __handle_mm_fault+0x649/0x1250 > handle_mm_fault+0xc1/0x220 > do_user_addr_fault+0x1ac/0x610 > ? _copy_to_user+0x63/0x80 > exc_page_fault+0x63/0x130 > asm_exc_page_fault+0x22/0x30 > RIP: 0033:0x7f3aada7f1ca > Code: c5 fe 7f 07 c5 fe 7f 47 20 c5 fe 7f 47 40 c5 fe 7f 47 60 c5 f8 77 c3 66 0f 1f 84 00 00 00 00 00 40 0f b6 c6 48 89 d1 48 89 fa aa 48 89 d0 c5 f8 77 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 > RSP: 002b:00007ffe47afa688 EFLAGS: 00010206 > RAX: 000000000000002e RBX: 0000000000033000 RCX: 000000000000999c > RDX: 00007f3aad8d1000 RSI: 000000000000002e RDI: 00007f3aad8d1000 > RBP: 0000558851e13240 R08: 0000000000000000 R09: 0000000000033000 > R10: 0000000000000008 R11: 0000000000000246 R12: 028f5c28f5c28f5c > R13: 8f5c28f5c28f5c29 R14: 000000000000999c R15: 0000000000001c81 > > ---[ end trace 0000000000000000 ]--- > XFS (pmem0): Unmounting Filesystem > XFS (pmem1): EXPERIMENTAL online scrub feature in use. Use at your own risk! > XFS (pmem1): *** REPAIR SUCCESS ino 0x80 type probe agno 0x0 inum 0x0 gen 0x0 flags 0x80000001 error 0 > XFS (pmem1): Unmounting Filesystem > XFS (pmem1): EXPERIMENTAL Large extent counts feature in use. Use at your own risk! > XFS (pmem1): Mounting V5 Filesystem > XFS (pmem1): Ending clean mount > XFS (pmem1): Unmounting Filesystem Yup, that's the same as what I'm seeing. Cheers, Dave. -- Dave Chinner david@fromorbit.com